General Cyber Flashcards

(44 cards)

1
Q

What is Encapsulation

A

The process of protocol information being added to data as it moves through the OSI model layers! Done via the form of a header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a firewall

A

A security device that can be applied to a network.

Placed at perimeter of the network to filter inbound and outbound traffic by using predefined rules

Can be software or dedicated hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

When a device pretends to be another device in a network

This can be done through actions from attackers spoofing an IP or MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a ACPO

A

Association of Chief of Police Officers

Created a set of guidelines for forensic investigators to be compliant with forensically sound processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is de-capsulation

A

During encapsulation process, protocol information being added is added to data; the de-capsulation process removes this info once the data is recorded at the corresponding layer on the destination computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a proxy ?

A

A device that can be added to the perimeter of a network which handles requests from clients by disguising the address/identity of the client in the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does DDOS stand for

A

Distributed Denial of Service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DDOS attack?

A

An attack where a large amount of packets are sent to a single device to overload the device and render it inoperable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The digital forensic process

A

Incident response, managing digital evidence, preparing forensic documentation.

It’s a scientific process that is repeatable and verifiable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a switch

A

A networking device used in a LAN to direct internal traffic.
Works at layer 2
Helps to break up collision domains
Utilises Physical MAC addresses in order to direct and forward traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authentication

A

Ensuring that an effective individual or device is in fact who they are claiming to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethical hacking steps

A

Reconnaissance
Scanning and enumeration
Vulnerability analysis
Gaining access
Escalating privileges
Maintaining access
Covering tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident response

A

The actions carried out in response to a cyber crime - securing the crime scene and identifying evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a router

A

A layer 3 device that carries out path determination and packet forwarding of network packets.
Traffic can’t move to an external network without passing through the router first.
Uses IP addressing in order to direct traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the main biometrics used

A

Fingerprints, iris, face and voice

A method to identifying a user due to physical characteristics that they have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

Used by attackers to trick users into giving out sensitive info that can assist in an attack on a system wether it’s physical or digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Steps for managing digital evidence

A

Acquiring digital evidence
Chain of custody
Processing evidence
Analysing evidence

The actions carried out during an investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 7 layers of a OSI Model

A

1.Physical
2. Data-link
3. Network
4. Transport
5. Session
6. Presentation
7. Application

19
Q

What is the OSI model

A

Open system interconnection model. A conceptual model that aids in understanding the process of packet traversing over a network

20
Q

What is Encryption

A

The process of changing data from plain text to a cypher text so a unauthorised user cannot read the data

21
Q

What is the Recon stage of Ethical hacking

A

Stage 1. Gathering information relating to the target system this can be done passively or actively persuing

22
Q

How to prepare forensic documentation

A

At the end of digi forensics investigations, there’s a number of pieces of documentation that are produced, including ;
A report documenting all actions, findings and justifications
Contemporaneous notes as well as documentation regarding the chain of custody.

23
Q

What is simplex?

A

Simplex is the context of network communication, it refers to one way communication

24
Q

What is the CIA

A

The cia triad is the foundational principles of data security
Confidentiality - data is not accessible via permission
Integrity - data should remain intact and not be manipulated
Availability - data should be secure, but should also be available to those who have permission to access whenever required

25
What is Scanning and Enumeration?
Step 2 in ethical hacking - the attacker scans a system for live hosts, open ports and vulnerabilities with various techniques in order to assist in the exploitation of a target
26
What is Evidence Integrity
Part of forensic investigation ; the integrity of evidence remains intact, as well as proof of this throughout an investigation. This demonstrates that evidence is admissible in court
27
Full Duplex
Refers to communication that is bi-directional Can travel in both directions at the same time
28
What does AAA stand for ?
Authentication, Authorization, Accounting
29
What is the triple AAA of the CIA
Authentication - Ensuring that a person or device is who they claim to be. Authorization - identifying that the authenticated person has permission to access the data that they request. Accounting - ensures that a log of the actions carried out by an authenticated user is created
30
What is Gaining Access of ethical hacking stage
Stage 4 - this is where the hack takes place after vulnerability analysis is finished this is the phase we exploit the vulnerabilities found in the system
31
What is Forensic soundness and how is it achieved ?
A. Making sure everything is carried out in a scientific, repeatable and verifiable manner. B. Achieved through evidence integrity, following the correct guidelines (ACPO) with relevant legislation throughout an investigation.
32
IP address
Internet Protocol address is used across networks of locations of devices are identifiable Each IP has 2 portions a host and a network. IPv4 is currently the most used IP version and is 32 bit address
33
Symmetric encryption
Is a single private key use in order to encrypt and decrypt data. Both the sender and recipient must have access to the private keys
34
What stage is covering tracks and what is it ?
Stage 7 - once an attacker has gained access to the target. They should attempt to clear their tracks such as deleting the logs of them being in the system or just completely wiping the logs all together.
35
Contemporaneous notes
These are notes taken at the time so that info is recorded ASAP and are as accurate as possible
36
What is half duplex
Bi-directional communication, but can only move in one direction at any onetime e.g Walkie-Talkies
37
What is Asymmetric encryption
Uses 2 keys a private and a public key to encrypt and decrypt data
38
What is maintaining access and what stage is it ?
Stage 6 - the attacker attempts to remain persistent (constant access) in the system. Stage 5(escalating privileges) would be used to maintain access
39
Continuity of evidence
Is ensuring the collection and actions carried out in regards to evidence is record and that any person in contact with the evidence is recorded aswell as the physical location of the evidence It’s essentially having a full timeline of every single swap and move that occurs with the evidence
40
What is a broadcast address
This is the last address within the addressing scheme It cannot be given to a host on the network and all traffic sent to it will be received by all devices in the network! E.g 192.168.10.255
41
Public Key
A public key is used in encryption and decryption process that can be known by anybody
42
Phishing
An attack in which they trick a user into surrendering confidential info by sending an email or link that seems from a legitimate source
43
Non-Volatile Data
Refers to persistent data, it’s also not lost when power to the system is removed. Common sources are data on USBs or HDD(hard drive disk)
44
What is cyber hygiene
Term referring to regular practice and habits adopted to maintain health and security of the system